Mastering Infrastructure Management
Insights and Strategies for Success
Kaido Järvemets Posts
Explore the capabilities and benefits of Microsoft Defender for Servers and Cloud. Learn about its integration with Defender for Endpoint, the use of log analytics and Azure monitor agent for monitoring, and the role of agentless scanning in vulnerability assessment....
Discover how Microsoft Sentinel's User Entity Behavior Analytics (UEBA) enhances security by identifying anomalous behavior, providing detailed threat information, and integrating with other security technologies...
Learn how to retrieve Entra ID Sign-In logs using the Microsoft.Graph PowerShell Module. This guide provides a step-by-step process to monitor user authentication events for security and troubleshooting purposes....
Learn how to query Entra ID user last sign-in activity data using PowerShell. This guide provides a step-by-step process to audit privileged accounts, identify inactive accounts, and minimize the risk of security breaches...
Dive into the integration of Entra ID Privileged Identity Management and Authentication Context. Learn how these robust security features work together to protect privileged identities in the cloud....
Learn how to simplify your cyber defense strategy by using PowerShell to enable and disable Attack Surface Reduction (ASR) rules on Windows devices....
Learn how to maximize efficiency with Configuration Manager Automation using PowerShell. Discover how to create device collections based on device model and automate your cloud workloads with Azure Automation....
Discover how PowerShell can automate the exporting and importing of SCCM queries, making it easier to manage queries within your environment....
Discover how Azure Update Management, a cloud-based patch management solution, can help organizations keep their Azure resources up-to-date with the most critical security and performance updates....
Explore the key features and benefits of Microsoft Sentinel SIEM, a comprehensive security solution that offers improved threat detection, increased security visibility, streamlined security operations, and reduced risk of cyber attacks....
A personal view of the field can provide you with an outsider’s insight, or an insider’s, depending on your current position. Keep checking to see if I have any new blog posts and products to share.
I aim to update this blog consistently and listen to what my readers wish for me to discuss. Here’s to us moving forward together.